SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
e-ISSN : 2620 3502
p-ISSN : 2615 3785
International Journal on Integrated Education
Volume 3, Issue X, October 2020 | 313
Cloud technology to ensure the protection of fundamental
methods and use of information
Mamarajabov Odil Elmurzayevich1
1
Teacher of the Department of Information Technology, Tashkent State Pedagogical University
named after Nizami
ABSTRACT
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods
of information protection, the possibilities of using hardware and software, and methods to combat threats
when eliminating them, ensuring data protection were carried out
Keywords: Cloud, Cloud Technology, Cloud Computing, Cloud Security, Authentication, Host,
Active Directory, Hypervisor, Cross Site Quality
1. INTRODUCTION
Cloud technology is a model that provides IT to the consumer as a service over the Internet. The
importance of "virtualization" technologies in the emergence of cloud computing is very high. The term
virtualization was long forgotten after 1960 when virtualization technology was first proposed by IBM but
expensive mainframe computer technology switched to cheaper x86 processor computer servers. The
situation began to change in 2000, when WMware gained a monopoly on x86-bit virtualization. In 2005,
WMware introduced virtual machines for free using DT. In 2006, Microsoft launched the Windows version
of Microsoft Virtual PC. In 2006, Amazon created the Amazon Elastic Compute Cloud by expanding virtual
servers on its devices. The cloud is an innovative model (concept) of IT infrastructure organizations,
consisting of separate and distributed configured hardware and network resources, software, which are
located in the data center of remote providers.
Functional attacks on cloud elements. This type of attack depends on the principle of general
security with a multi-layered cloud. The solution to cloud security is as follows: to protect against functional
attacks, the following source of protection should be placed on each part of the cloud: for proxy - DoS -
effective protection against attack, for web - server - control the integrity of pages , for server applications -
screen-level applications, for MBBT - SQL - injection protection, for data storage systems - to give proper
backups (backups), restrict use. The protection mechanisms listed above have been developed, but they have
not yet been put together to provide comprehensive cloud protection. Therefore, when creating a cloud,
integrating them into a single system will solve the problem.
2. MAIN PART
Attacks on the control system. Many virtual machines used in the cloud require separate system
management. Disruption of the control system in virtual machines - causes a malfunction and blames another
virtual machine by blocking one virtual machine.
One of the most effective ways to provide security in the cloud is the Cloud Security Alliance (CSA),
which analyzes the following data:
Data storage. Encryption is one of the most effective ways to protect your data. The provider that
allows access to the data must encrypt the customer data stored at the data center, and delete it without return
if it is no longer in use.
Data security in transmission. Transfer of encrypted data can be done only after authentication.
Data can be read or modified and accessed through trusted links. Such technologies are implemented in very
popular algorithms and reliable protocols AES, TLS, Ipsec.
Authentication. Password protection. Tokens and certificates are the focus of great reliability. The
provider must be transparent in authorizing the identification system. It uses LDAP (Light Directory Access
Protocol) and SAML (Security Assertion Markup Language) protocols.
Consumer isolation. Individual use of virtual machines and virtual networks. The following
technologies should be implemented in virtual networks. VPN (Virtual Private Network), VLAN (Virtual
Local Area Network) and VPLS (Virtual Private LAN Service). Providers often isolate consumer data from
each other due to code changes in a single application environment. This approach is risky, as it can find its
way into non-standard code and use consumer data.
Information security in the use of cloud technologies
If we look at cloud technologies from a technological point of view, the performance of applications
does not differ much from the performance of traditional. Business systems also run on a separate computer,
and only in cloud technologies can they be virtual. The data is stored on servers, and they are divided into
several compute nodes or placed on a single large server. Many experts believe that information security in
cloud technologies should be built on the principle of traditional system protection.
Based on the facts, we can divide the protection of cloud technologies into two:
- equipment safety prevention;
- data security.
In order to ensure the protection of customers, the provider needs to organize the protection of its
e-ISSN : 2620 3502
p-ISSN : 2615 3785
International Journal on Integrated Education
Volume 3, Issue X, October 2020 | 314
hardware and software from unauthorized access, tampering with IT systems, code modification. In turn, the
client has the ability to use encryption technology to protect it from external attacks when entering any
necessary or personal information into the system.
This includes a number of security benefits in cloud technology.
The protection of cloud technologies is determined not only by the operator or the client, but also
by where it is used and the type of method.
Private Cloud. Providing information security in a private cloud environment is very easy. When
working with personal cloud, we can only use computing resources and data storage service models and
graphics. Then all the valuable information will remain with the company. Due to strict measures, the data
on the virtual desktop may not be saved when the network is turned off. A private cloud will not only be able
to provide the full range of protection as well as the full functionality of the platform and applications.
The private cloud has an arsenal of code-encoded, securely differentiated, clustered, authenticated,
and maximum use of audited transactions and protected data.
A modern software solution can do a lot of work, reflecting the convenience of personal use of the
database system. In particular, such features give Run-Time Privilege Analysis and Data Redactions the
privilege of detecting actions that are accessing and using data stored in cloud technologies. But a private
cloud requires qualified personnel, which ensures the level of service to the servers, uninterrupted and
efficient virtual software at work.
It also maintains the level of business applications, workflow and service demand in the cloud. There
should be kata and experienced professionals in the field of cloud security. Not all companies have this
situation, so one of the most common types today is social cloud technology.
Social Cloud. One of the advantages of a public cloud is that your data is transferred to another
organization and at the same time ensures its transmission and storage. Because valuable data leaves the
network on a regular basis, it requires additional protection. Unfortunately, social and hybrid or traditional,
private cloud systems cannot provide the same level of security. That’s why many angry providers have to
focus on the limited activities of services to effectively implement security in the social cloud. However,
many organizations prefer to choose providers to ensure cloud security. Significantly in recent years, data
stored in the cloud has been weakened and feasible by users in other countries, raising fears. That's what
Steve Rose, director of consulting at Verint Systems, says.
Protection technology. In the field of IT, the cloud protection strategy provides a very high level
of security, while having the highest standards of personal data protection. Cloud computing always allows
participants to define requirements for each component level, defining the area. The possibility of
implementing such requirements is being addressed today. Emphasis should be placed on reliable deployment
and use of the internship program. Ilya Trifalenkov, director of the R-Style Center for Information Security,
said that the level of application software provides access to data. Only this level of application software is
at the forefront of maximum risk.
The most common threats in cloud environments are the conversion of virtual machines from the
operating state, changes in the network topology of the IT infrastructure using only program parameters,
attacks on IT directly from network protection mechanisms tooth This risk is reduced due to the protection
of the virtual environment at all stages of construction, ie: virtual infrastructure, system management and
storage system, hardware, system software schedule (hypervisor).
If we look at modern solutions, it allows to create a firewall on virtual machines, which allows
continuous monitoring of virtual machines. The level of service protection is protected by a firewall,
operating in a cloud computing environment.
3. CONCLUSION
The firewall can be processed at the service level in accordance with the requirements of a separate
network protocol, ie specialized protocols can be filtered. Cloud computing security is provided by a caster
firewall, which allows free users to control the access of address information to the virtual environment. Log
updates can be entered automatically or manually. The level of protection provided by the segment AIS
hardware or personal firewall. Depending on the network reliability requirements, high reliability, a separate
firewall, a firewall with user workstations, a group can be used.
REFERENCES:
1. Khasanov A.A. (2018). Didactic Foundations of Interdisci plinary Connections at Subject
Teaching. Eastern European Scientific Journal, Germany -2018. No. 6, pp. 127-130.
2. Khasanov A.A. (2017). Methods and methods of forming economic education through interdisci
plinary communication through information technology. Education, Science and Innovation.
Spiritual-Educational, Scientific and Methodological Journal, №3, pp. 38- 44.
3. Mamarajabov O.E. Abdurazzoqov J.A. The benefits of using information technology in the
education system // European Journal of Research and Reflection in Educational Sciences Vol. 7
No. 12, 2019. P.446-450
4. Pulatova N.R., & Khasanov, A.A. (2019). Role of innovation in school development. European
Journal of Research and Reflection in Educational Sciences, Vol. 7 No. 12, pp.502-504.
e-ISSN : 2620 3502
p-ISSN : 2615 3785
International Journal on Integrated Education
Volume 3, Issue X, October 2020 | 315
5. Urokova Sh., & Tuhtashev U. (2019). Trends of electronic education evelopment.European
Journal of Research and Reflection in Educational Sciences, Vol. 7 No. 12, pp. 768-771.
6. Hasanov A.A., & Gatiyatulina R.M. (2016). Interdisci plinary communication as a didactic
conditions of increase of efficiency of educational process. Eastern European Scientific Journal
Germany. Àuris - kommunikations-Und verlagsgesellschaft mdh 5-2016, pp.107-111.

Mais conteúdo relacionado

Mais procurados

Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6IAEME Publication
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 

Mais procurados (17)

Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
B018211016
B018211016B018211016
B018211016
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Ea33762765
Ea33762765Ea33762765
Ea33762765
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
G033030035
G033030035G033030035
G033030035
 
76 s201913
76 s20191376 s201913
76 s201913
 

Semelhante a Cloud technology to ensure the protection of fundamental methods and use of information

Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 

Semelhante a Cloud technology to ensure the protection of fundamental methods and use of information (20)

Fog computing document
Fog computing documentFog computing document
Fog computing document
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 

Mais de SubmissionResearchpa

Harmony between society and personality, and its influence on the phenomenon ...
Harmony between society and personality, and its influence on the phenomenon ...Harmony between society and personality, and its influence on the phenomenon ...
Harmony between society and personality, and its influence on the phenomenon ...SubmissionResearchpa
 
Establishment of the Institute and Waqf aspects of its development in Central...
Establishment of the Institute and Waqf aspects of its development in Central...Establishment of the Institute and Waqf aspects of its development in Central...
Establishment of the Institute and Waqf aspects of its development in Central...SubmissionResearchpa
 
The history of the Kokand Khanate in the press of Turkestan (According to Sut...
The history of the Kokand Khanate in the press of Turkestan (According to Sut...The history of the Kokand Khanate in the press of Turkestan (According to Sut...
The history of the Kokand Khanate in the press of Turkestan (According to Sut...SubmissionResearchpa
 
Of partial defects of the dental rows of dynamic study of the state of the mu...
Of partial defects of the dental rows of dynamic study of the state of the mu...Of partial defects of the dental rows of dynamic study of the state of the mu...
Of partial defects of the dental rows of dynamic study of the state of the mu...SubmissionResearchpa
 
The essence and specifics of modern social and cultural activities in Karakal...
The essence and specifics of modern social and cultural activities in Karakal...The essence and specifics of modern social and cultural activities in Karakal...
The essence and specifics of modern social and cultural activities in Karakal...SubmissionResearchpa
 
International commercial arbitration in Uzbekistan: current state and develop...
International commercial arbitration in Uzbekistan: current state and develop...International commercial arbitration in Uzbekistan: current state and develop...
International commercial arbitration in Uzbekistan: current state and develop...SubmissionResearchpa
 
Obtaining higher fatty alcohols based on low molecular polyethylene and their...
Obtaining higher fatty alcohols based on low molecular polyethylene and their...Obtaining higher fatty alcohols based on low molecular polyethylene and their...
Obtaining higher fatty alcohols based on low molecular polyethylene and their...SubmissionResearchpa
 
Re-positioning adult education for development to thrive in Nigeria
Re-positioning adult education for development to thrive in NigeriaRe-positioning adult education for development to thrive in Nigeria
Re-positioning adult education for development to thrive in NigeriaSubmissionResearchpa
 
Re-thinking adult basic education in the 21st century
Re-thinking adult basic education in the 21st centuryRe-thinking adult basic education in the 21st century
Re-thinking adult basic education in the 21st centurySubmissionResearchpa
 
Infantile cerebral palsy and dental anomalies
Infantile cerebral palsy and dental anomaliesInfantile cerebral palsy and dental anomalies
Infantile cerebral palsy and dental anomaliesSubmissionResearchpa
 
An innovative mechanisms to increase the effectiveness of independent educati...
An innovative mechanisms to increase the effectiveness of independent educati...An innovative mechanisms to increase the effectiveness of independent educati...
An innovative mechanisms to increase the effectiveness of independent educati...SubmissionResearchpa
 
The role of radiation diagnostic methods in pathological changes of the hip j...
The role of radiation diagnostic methods in pathological changes of the hip j...The role of radiation diagnostic methods in pathological changes of the hip j...
The role of radiation diagnostic methods in pathological changes of the hip j...SubmissionResearchpa
 
Positive and negative features of mythological images in the epics “Beowulf” ...
Positive and negative features of mythological images in the epics “Beowulf” ...Positive and negative features of mythological images in the epics “Beowulf” ...
Positive and negative features of mythological images in the epics “Beowulf” ...SubmissionResearchpa
 
Special three processes of production and implementation
Special three processes of production and implementationSpecial three processes of production and implementation
Special three processes of production and implementationSubmissionResearchpa
 
Improving traditional methods of teaching chemistry
Improving traditional methods of teaching chemistryImproving traditional methods of teaching chemistry
Improving traditional methods of teaching chemistrySubmissionResearchpa
 
Expression of spiritual experiences in art
Expression of spiritual experiences in artExpression of spiritual experiences in art
Expression of spiritual experiences in artSubmissionResearchpa
 
Due to intolerance of dental materials used for therapeutic treatment
Due to intolerance of dental materials used for therapeutic treatmentDue to intolerance of dental materials used for therapeutic treatment
Due to intolerance of dental materials used for therapeutic treatmentSubmissionResearchpa
 

Mais de SubmissionResearchpa (20)

Harmony between society and personality, and its influence on the phenomenon ...
Harmony between society and personality, and its influence on the phenomenon ...Harmony between society and personality, and its influence on the phenomenon ...
Harmony between society and personality, and its influence on the phenomenon ...
 
Establishment of the Institute and Waqf aspects of its development in Central...
Establishment of the Institute and Waqf aspects of its development in Central...Establishment of the Institute and Waqf aspects of its development in Central...
Establishment of the Institute and Waqf aspects of its development in Central...
 
The history of the Kokand Khanate in the press of Turkestan (According to Sut...
The history of the Kokand Khanate in the press of Turkestan (According to Sut...The history of the Kokand Khanate in the press of Turkestan (According to Sut...
The history of the Kokand Khanate in the press of Turkestan (According to Sut...
 
Of partial defects of the dental rows of dynamic study of the state of the mu...
Of partial defects of the dental rows of dynamic study of the state of the mu...Of partial defects of the dental rows of dynamic study of the state of the mu...
Of partial defects of the dental rows of dynamic study of the state of the mu...
 
The essence and specifics of modern social and cultural activities in Karakal...
The essence and specifics of modern social and cultural activities in Karakal...The essence and specifics of modern social and cultural activities in Karakal...
The essence and specifics of modern social and cultural activities in Karakal...
 
International commercial arbitration in Uzbekistan: current state and develop...
International commercial arbitration in Uzbekistan: current state and develop...International commercial arbitration in Uzbekistan: current state and develop...
International commercial arbitration in Uzbekistan: current state and develop...
 
Obtaining higher fatty alcohols based on low molecular polyethylene and their...
Obtaining higher fatty alcohols based on low molecular polyethylene and their...Obtaining higher fatty alcohols based on low molecular polyethylene and their...
Obtaining higher fatty alcohols based on low molecular polyethylene and their...
 
Re-positioning adult education for development to thrive in Nigeria
Re-positioning adult education for development to thrive in NigeriaRe-positioning adult education for development to thrive in Nigeria
Re-positioning adult education for development to thrive in Nigeria
 
Re-thinking adult basic education in the 21st century
Re-thinking adult basic education in the 21st centuryRe-thinking adult basic education in the 21st century
Re-thinking adult basic education in the 21st century
 
Uyghur folk singing genre
Uyghur folk singing genreUyghur folk singing genre
Uyghur folk singing genre
 
Infantile cerebral palsy and dental anomalies
Infantile cerebral palsy and dental anomaliesInfantile cerebral palsy and dental anomalies
Infantile cerebral palsy and dental anomalies
 
An innovative mechanisms to increase the effectiveness of independent educati...
An innovative mechanisms to increase the effectiveness of independent educati...An innovative mechanisms to increase the effectiveness of independent educati...
An innovative mechanisms to increase the effectiveness of independent educati...
 
The role of radiation diagnostic methods in pathological changes of the hip j...
The role of radiation diagnostic methods in pathological changes of the hip j...The role of radiation diagnostic methods in pathological changes of the hip j...
The role of radiation diagnostic methods in pathological changes of the hip j...
 
Idealistic study of proverbs
Idealistic study of proverbsIdealistic study of proverbs
Idealistic study of proverbs
 
Positive and negative features of mythological images in the epics “Beowulf” ...
Positive and negative features of mythological images in the epics “Beowulf” ...Positive and negative features of mythological images in the epics “Beowulf” ...
Positive and negative features of mythological images in the epics “Beowulf” ...
 
Special three processes of production and implementation
Special three processes of production and implementationSpecial three processes of production and implementation
Special three processes of production and implementation
 
Improving traditional methods of teaching chemistry
Improving traditional methods of teaching chemistryImproving traditional methods of teaching chemistry
Improving traditional methods of teaching chemistry
 
Expression of spiritual experiences in art
Expression of spiritual experiences in artExpression of spiritual experiences in art
Expression of spiritual experiences in art
 
Natural emergencies
Natural emergenciesNatural emergencies
Natural emergencies
 
Due to intolerance of dental materials used for therapeutic treatment
Due to intolerance of dental materials used for therapeutic treatmentDue to intolerance of dental materials used for therapeutic treatment
Due to intolerance of dental materials used for therapeutic treatment
 

Último

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Cloud technology to ensure the protection of fundamental methods and use of information

  • 1. e-ISSN : 2620 3502 p-ISSN : 2615 3785 International Journal on Integrated Education Volume 3, Issue X, October 2020 | 313 Cloud technology to ensure the protection of fundamental methods and use of information Mamarajabov Odil Elmurzayevich1 1 Teacher of the Department of Information Technology, Tashkent State Pedagogical University named after Nizami ABSTRACT A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out Keywords: Cloud, Cloud Technology, Cloud Computing, Cloud Security, Authentication, Host, Active Directory, Hypervisor, Cross Site Quality 1. INTRODUCTION Cloud technology is a model that provides IT to the consumer as a service over the Internet. The importance of "virtualization" technologies in the emergence of cloud computing is very high. The term virtualization was long forgotten after 1960 when virtualization technology was first proposed by IBM but expensive mainframe computer technology switched to cheaper x86 processor computer servers. The situation began to change in 2000, when WMware gained a monopoly on x86-bit virtualization. In 2005, WMware introduced virtual machines for free using DT. In 2006, Microsoft launched the Windows version of Microsoft Virtual PC. In 2006, Amazon created the Amazon Elastic Compute Cloud by expanding virtual servers on its devices. The cloud is an innovative model (concept) of IT infrastructure organizations, consisting of separate and distributed configured hardware and network resources, software, which are located in the data center of remote providers. Functional attacks on cloud elements. This type of attack depends on the principle of general security with a multi-layered cloud. The solution to cloud security is as follows: to protect against functional attacks, the following source of protection should be placed on each part of the cloud: for proxy - DoS - effective protection against attack, for web - server - control the integrity of pages , for server applications - screen-level applications, for MBBT - SQL - injection protection, for data storage systems - to give proper backups (backups), restrict use. The protection mechanisms listed above have been developed, but they have not yet been put together to provide comprehensive cloud protection. Therefore, when creating a cloud, integrating them into a single system will solve the problem. 2. MAIN PART Attacks on the control system. Many virtual machines used in the cloud require separate system management. Disruption of the control system in virtual machines - causes a malfunction and blames another virtual machine by blocking one virtual machine. One of the most effective ways to provide security in the cloud is the Cloud Security Alliance (CSA), which analyzes the following data: Data storage. Encryption is one of the most effective ways to protect your data. The provider that allows access to the data must encrypt the customer data stored at the data center, and delete it without return if it is no longer in use. Data security in transmission. Transfer of encrypted data can be done only after authentication. Data can be read or modified and accessed through trusted links. Such technologies are implemented in very popular algorithms and reliable protocols AES, TLS, Ipsec. Authentication. Password protection. Tokens and certificates are the focus of great reliability. The provider must be transparent in authorizing the identification system. It uses LDAP (Light Directory Access Protocol) and SAML (Security Assertion Markup Language) protocols. Consumer isolation. Individual use of virtual machines and virtual networks. The following technologies should be implemented in virtual networks. VPN (Virtual Private Network), VLAN (Virtual Local Area Network) and VPLS (Virtual Private LAN Service). Providers often isolate consumer data from each other due to code changes in a single application environment. This approach is risky, as it can find its way into non-standard code and use consumer data. Information security in the use of cloud technologies If we look at cloud technologies from a technological point of view, the performance of applications does not differ much from the performance of traditional. Business systems also run on a separate computer, and only in cloud technologies can they be virtual. The data is stored on servers, and they are divided into several compute nodes or placed on a single large server. Many experts believe that information security in cloud technologies should be built on the principle of traditional system protection. Based on the facts, we can divide the protection of cloud technologies into two: - equipment safety prevention; - data security. In order to ensure the protection of customers, the provider needs to organize the protection of its
  • 2. e-ISSN : 2620 3502 p-ISSN : 2615 3785 International Journal on Integrated Education Volume 3, Issue X, October 2020 | 314 hardware and software from unauthorized access, tampering with IT systems, code modification. In turn, the client has the ability to use encryption technology to protect it from external attacks when entering any necessary or personal information into the system. This includes a number of security benefits in cloud technology. The protection of cloud technologies is determined not only by the operator or the client, but also by where it is used and the type of method. Private Cloud. Providing information security in a private cloud environment is very easy. When working with personal cloud, we can only use computing resources and data storage service models and graphics. Then all the valuable information will remain with the company. Due to strict measures, the data on the virtual desktop may not be saved when the network is turned off. A private cloud will not only be able to provide the full range of protection as well as the full functionality of the platform and applications. The private cloud has an arsenal of code-encoded, securely differentiated, clustered, authenticated, and maximum use of audited transactions and protected data. A modern software solution can do a lot of work, reflecting the convenience of personal use of the database system. In particular, such features give Run-Time Privilege Analysis and Data Redactions the privilege of detecting actions that are accessing and using data stored in cloud technologies. But a private cloud requires qualified personnel, which ensures the level of service to the servers, uninterrupted and efficient virtual software at work. It also maintains the level of business applications, workflow and service demand in the cloud. There should be kata and experienced professionals in the field of cloud security. Not all companies have this situation, so one of the most common types today is social cloud technology. Social Cloud. One of the advantages of a public cloud is that your data is transferred to another organization and at the same time ensures its transmission and storage. Because valuable data leaves the network on a regular basis, it requires additional protection. Unfortunately, social and hybrid or traditional, private cloud systems cannot provide the same level of security. That’s why many angry providers have to focus on the limited activities of services to effectively implement security in the social cloud. However, many organizations prefer to choose providers to ensure cloud security. Significantly in recent years, data stored in the cloud has been weakened and feasible by users in other countries, raising fears. That's what Steve Rose, director of consulting at Verint Systems, says. Protection technology. In the field of IT, the cloud protection strategy provides a very high level of security, while having the highest standards of personal data protection. Cloud computing always allows participants to define requirements for each component level, defining the area. The possibility of implementing such requirements is being addressed today. Emphasis should be placed on reliable deployment and use of the internship program. Ilya Trifalenkov, director of the R-Style Center for Information Security, said that the level of application software provides access to data. Only this level of application software is at the forefront of maximum risk. The most common threats in cloud environments are the conversion of virtual machines from the operating state, changes in the network topology of the IT infrastructure using only program parameters, attacks on IT directly from network protection mechanisms tooth This risk is reduced due to the protection of the virtual environment at all stages of construction, ie: virtual infrastructure, system management and storage system, hardware, system software schedule (hypervisor). If we look at modern solutions, it allows to create a firewall on virtual machines, which allows continuous monitoring of virtual machines. The level of service protection is protected by a firewall, operating in a cloud computing environment. 3. CONCLUSION The firewall can be processed at the service level in accordance with the requirements of a separate network protocol, ie specialized protocols can be filtered. Cloud computing security is provided by a caster firewall, which allows free users to control the access of address information to the virtual environment. Log updates can be entered automatically or manually. The level of protection provided by the segment AIS hardware or personal firewall. Depending on the network reliability requirements, high reliability, a separate firewall, a firewall with user workstations, a group can be used. REFERENCES: 1. Khasanov A.A. (2018). Didactic Foundations of Interdisci plinary Connections at Subject Teaching. Eastern European Scientific Journal, Germany -2018. No. 6, pp. 127-130. 2. Khasanov A.A. (2017). Methods and methods of forming economic education through interdisci plinary communication through information technology. Education, Science and Innovation. Spiritual-Educational, Scientific and Methodological Journal, №3, pp. 38- 44. 3. Mamarajabov O.E. Abdurazzoqov J.A. The benefits of using information technology in the education system // European Journal of Research and Reflection in Educational Sciences Vol. 7 No. 12, 2019. P.446-450 4. Pulatova N.R., & Khasanov, A.A. (2019). Role of innovation in school development. European Journal of Research and Reflection in Educational Sciences, Vol. 7 No. 12, pp.502-504.
  • 3. e-ISSN : 2620 3502 p-ISSN : 2615 3785 International Journal on Integrated Education Volume 3, Issue X, October 2020 | 315 5. Urokova Sh., & Tuhtashev U. (2019). Trends of electronic education evelopment.European Journal of Research and Reflection in Educational Sciences, Vol. 7 No. 12, pp. 768-771. 6. Hasanov A.A., & Gatiyatulina R.M. (2016). Interdisci plinary communication as a didactic conditions of increase of efficiency of educational process. Eastern European Scientific Journal Germany. Àuris - kommunikations-Und verlagsgesellschaft mdh 5-2016, pp.107-111.